HostedDB - Dedicated UNIX Servers

index_28
Router Security Configuration Guide UNCLASSIFIED 28 UNCLASSIFIED Version 1.0g 2.7.  References 2.7.1.   Books [1]    Albritton, J. Cisco IOS Essentials, McGraw-Hill, 1999. An excellent introduction to basic IOS operations, with explanations of many of the concepts. If you need more introductory information than this section provides, this book is a good source. [2]    Ballew, S.M., Managing IP Networks with Cisco Routers, O’Reilly Associates, 1997. A practical introduction to the concepts and practices for using Cisco routers. [3]    Chappell, L. Introduction to Cisco Router Configuration, Cisco Press, 1998. A good book for le arning the basics, with an emphasis on Cisco IOS. [4]    Chappell, L. (ed.) Advanced Cisco Router Configuration, Cisco Press, 1999. For the network administrator who already has basic familiarity with Cisco IOS, this book provides detailed information about a wide variety of topics and features. [5]    Perlman, R.,  Interconnections: Bridges and Routers, McGraw-Hill, 1992. This book offers good explanations of all the underlying concepts, with no vendor emphasis. [6]    Sacket, G., Cisco Router Handbook , McGraw-Hill, 1999. This thick book provides a lot of detail on the architecture of Cisco routers and their operational concepts. [7]    Held, G. and Hundley, K., Cisco Security Architectures, McGraw-Hill, 1999. For administrators already comfortable with basic operation of a router, this book provides concepts and practical advice for using a router securely. [8]    Tannenbaum, A., Computer Networks, 2nd edition, Prentice-Hall, 1998. A “classic”, well written, good background reading, an excellent source for understanding all the concepts behind networks, routers, and TCP/IP. [9]    Stevens, W.R., Unix Network Programming, Prentice-Hall, 1998. This book is primarily oriented toward network application programmers, but it also provides a great deal of technical background information.